Let me try phrasing the issue differently. I may still be missing the point, from all sides.

I believe that what is actually wanted is primarily:
o To prevent any advertiser from sending an advertisement that would cause other properly behaving parties to send traffic iin a way that they are not "entitled" to cause

As secondary matter
o We want such attempted subversion to be visible at more than one hop because experience tells us that not everyone deploys the tools properly, and thus we can not count on every honest player doing their job well.

(Colluding subverting players is addressed only to the degree that it is covered by what we are after, not explicitly. We are staying away from Byzantine Generals.)

The above probably needs more wordsmithing, but is a problem statement that does not assume that packets follow their advertisements, nor that any party can control what any other party actually does. It also avoids getting into the question of the accuracy of the reflection of the path of the advertisement, the AS path in the advertisement, and the actual packet flow. Instead, it focuses on an attack we are trying to prevent. I believe that the primary solutions on the table are all solutions that can be reasonably considered to address the problem as stated. (I.e. I am not trying to change the solutions pace, only to clarify the problem space.)

Apologies if I am still completely confused.
Yours,
Joel

On 2/25/2011 9:14 AM, John Scudder wrote:
On Feb 25, 2011, at 4:10 PM, Russ White wrote:
Can you explain the difference in some other way that doesn't mix the
two ideas?

Since after reading your message carefully three times I don't understand your 
question, I'm unable to answer it. Sorry.

You're apparently trying to separate the idea of proving an update
traveled a specific path from the idea of using this information to
actually filter or determine any other policy. I don't see how you can
separate the two --can you explain how you can?

If you can establish the former (that the route did travel across the path it 
said it did), that outcome can be used as input to policy.  This is exactly 
analogous to draft-ietf-sidr-pfx-validate-01, BTW.

Divide, conquer.  A commonly used trick in computing. :-)

--John
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to